Define the sound to play when the alarm condition is met.
How to open this dialog
From the Alarm Actions - Alarm Log Filter Dialog
Play the sound:
Click to browse to the sound file on the computer.
Tip: Click Preview to play the sound to ensure you have selected the right one. The success (or otherwise) of the action depends on your system setup. Spotlight does not monitor the success of the action. We recommend that you preview it.
Select the desired Play sound option.
Option |
Description |
---|---|
Once |
Play once. |
Until the severity of the control ... returns to normal |
Play until the effected Spotlight control no longer registers an alarm. |
Until the connection severity returns to normal |
Play until the Spotlight connection no longer registers an alarm. |
Until the following condition is met. |
Play until the condition is met. |
Tip: When an alarm has been triggered and the relevant sound plays continuously, you can mute the sound by clicking . This button is not shown on the toolbar unless a Play sound action is enabled.
Define the program (executable file) to run when the alarm condition is met.
Usually that program is one that you have written to perform a particular task. The task may be a simple action, or may be one that depends on a supplied Spotlight parameter – a value or range of values, or the name of a component or connection.
How to open this dialog
From the Alarm Actions - Alarm Log Filter Dialog
Run program:
Click to browse to the sound file on the computer.
Tip: Click Preview to play the sound to ensure you have selected the right one.
Select the desired Play sound option.
Option |
Description |
---|---|
Program |
Click to browse to the program file on the computer. |
Parameters |
Enter any parameters the program may need to run successfully, or click {} to choose a parameter from the supplied list. |
Test |
Click to test the performance of the selected program. Note: The success (or otherwise) of the action depends on your system setup. Spotlight does not monitor the success of the action. We recommend that you test it. |
Caution: If the program that runs in response to an alarm is still executing when the alarm fires again, subsequent commands to run the program are ignored until that execution finishes.
Send an email when the alarm condition is met.
How to open this dialog
From the Alarm Actions - Alarm Log Filter Dialog
Send e-mail to:
Option |
Description |
---|---|
To |
Enter the recipient email address. |
Subject |
Supply a subject for the email. Tip: Click {} to select a parameter from the supplied list. The selected parameter is displayed within a set of braces {}. You can choose multiple parameters if required. |
Message |
Enter the message to send. Tip: Click {} to select a parameter from the supplied list. The selected parameter is displayed within a set of braces {}. You can choose multiple parameters if required. |
Test |
Click to test the performance of your email system. Note: The success (or otherwise) of the action depends on your system setup. Spotlight does not monitor the success of the action. We recommend that you test it. |
Note: For the email message to reach its intended recipient, an appropriate email client must be installed correctly on both source and target machines.
Send a message to a machine on the network using the Windows messaging service.
How to open this dialog
From the Alarm Actions - Alarm Log Filter Dialog
Send network message to to:
Option |
Description |
---|---|
Address |
Enter the name of the machine where you want to send the message. |
Message |
Enter the message to send. Tip: Click {} to select a parameter from the supplied list. The selected parameter is displayed within a set of braces {}. You can choose multiple parameters if required. |
Test |
Click to test the performance of the network messaging system. Note: The success (or otherwise) of the action depends on your system setup. Spotlight does not monitor the success of the action. We recommend that you test it. |
Note: For the message to reach its intended recipient, the Windows Messaging service must be active on both the source and target machines on the network.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center